EP1592188A1 - Method and apparatus for transmission of digitally signed electronic mail - Google Patents
Method and apparatus for transmission of digitally signed electronic mail Download PDFInfo
- Publication number
- EP1592188A1 EP1592188A1 EP04101878A EP04101878A EP1592188A1 EP 1592188 A1 EP1592188 A1 EP 1592188A1 EP 04101878 A EP04101878 A EP 04101878A EP 04101878 A EP04101878 A EP 04101878A EP 1592188 A1 EP1592188 A1 EP 1592188A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- signed
- message
- mail message
- opaque
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000005540 biological transmission Effects 0.000 title description 7
- 238000006243 chemical reaction Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/60—Business processes related to postal services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/066—Format adaptation, e.g. format conversion or compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Definitions
- This invention relates generally to computing systems and, more particularly, to computing systems for the creation and transmission of secure electronic mail.
- Electronic mail (e-mail) systems will, in many cases, include a feature to allow e-mail messages to be digitally signed.
- a digital signature is an encoded value that is included with an e-mail message to provide a recipient with information to confirm that the message is sent by a trusted sender and/or that the message is unchanged during the transmission process.
- Such an email system is considered a secure e-mail system.
- a well-known protocol for secure e-mail is the Secure Multi-Purpose Internet Mail Extension (S/MIME).
- An opaque signature is one where the secure e-mail has the message content contained inside the digital signature encoding. This approach, defines a signature for the message content and then encodes both that signature and the message content. The resulting encoded data is then transmitted as the e-mail message body.
- a clear signature is one in which a digital signature is encoded and included with the e-mail message as an attachment. The message content is not altered and is sent in this unaltered state in the message body of the e-mail.
- An advantage of an opaque e-mail message is that the content of the message is not available to recipients who are not provided with the appropriate information to decode the e-mail message body.
- the message content is not immediately available, there is less of a potential for an email gateway to modify the message in some way and, in doing so, invalidate the digital signature.
- a disadvantage to the use of opaque signatures for secure e-mail is that many e-mail applications (for example Outlook 2000TM from Microsoft Corporation) are unable to display opaque signed messages in the message preview pane. To obtain the preview of the message, a user of such an e-mail application is required to open the email, thus defeating the advantages associated with the use of a preview view in the e-mail application.
- a receiving e-mail application does not support the protocol used to encode the e-mail, the content of an opaque signed e-mail message cannot be viewed at all.
- a method and system for the transmission of e-mails to provide for conversion of secure e-mail to permit a receiving e-mail application to use a preview view for the e-mail or to access the message content without decoding the digital signature.
- a computer implemented method for transmitting e-mail including the following steps:
- the step of extracting the content of and the digital signature of the first e-mail message includes the steps of:
- an apparatus for transmitting e-mail including an e-mail server, the e-mail server including:
- the above apparatus in which the first secure e-mail message conforms to the S/MIME standard.
- the above apparatus in which the computer code for extracting the content of and the digital signature of the opaque signed e-mail message includes the steps of:
- Advantages of the invention include the ability for a sending e-mail application to use opaque signatures for outbound e-mails and for a receiving e-mail application to be able to view the message content and/or generate a preview of such secure e-mails without needing to decode the associated digital signature.
- FIG. 1 The block diagram of Figure 1 illustrates one such arrangement.
- Sending e-mail application 10 uses e-mail server 12 to handle outbound e-mails generated by e-mail application 10.
- receiving e-mail application 14 is a recipient of e-mails from sending e-mail application 10.
- an e-mail application includes program code that is executable to provide a user with the ability to manipulate e-mail messages.
- an e-mail application will provide the user with functions for creating, sending, receiving, viewing, and storing e-mail messages. Subsets of these functions may also be provided in different e-mail applications intended to be used with particular devices.
- the program code of an e-mail application may be executable on a personal computer, a wireless handheld device, or other devices that are intended to permit e-mails to be created or read.
- FIG. 1 shows opaque e-mail 16 being forwarded from sending e-mail application 10 to e-mail server 12.
- e-mail application 10 may be one of many commercially available or custom-developed e-mail systems.
- E-mail application 10 does, however, have the capability of generating secure e-mail using an opaque signature.
- opaque e-mail 16 is such an e-mail generated by e-mail application 10.
- FIG. 2 is a block diagram that illustrates the high level elements of an e-mail message having an opaque signature and provides a similar illustration for an e-mail having a clear signature.
- e-mail message body 20 shown as containing signature 22 which, in turn, contains content 24 within its encoding.
- signature 22 is encoded.
- e-mail message body 30 a generalized example of a clear signed e-mail is illustrated with e-mail message body 30 and e-mail attachment 31.
- E-mail message body 30 includes content 34 which is not encoded within the signature.
- signature 32 is encoded and is placed in e-mail attachment 31.
- a preview pane that is optionally displayed when lists of e-mail messages are displayed for a user.
- the preview pane it is typical for the preview pane to merely present the e-mail message content (or a portion of the content) without decoding such content.
- the message is not viewable in the preview pane of such a receiving e-mail application.
- e-mail is transmitted through an e-mail server.
- the e-mail server includes program code for converting opaque signed e-mail to a clear signed format.
- Sending e-mail application 10 generates example e-mail 16, in opaque signed S/MIME format.
- this e-mail is forwarded to e-mail server 12, prior to the e-mail being sent to receiving e-mail application 14.
- the functionality of e-mail server 12 includes a conversion function to convert opaque signed messages to clear signed messages.
- e-mail server 12 is able to decrypt the opaque signed messages sent by sending e-mail application 10.
- the encoding of e-mail 16 is an S/MIME encoding and the steps carried out to convert e-mail message 16 into a clear signed format (e-mail 18) are set out in the flow diagram of Figure 3.
- the step of conversion includes extraction of the message content and of the digital signature from the opaque signed e-mail, the extracted message content and the extracted digital signature then being included in a clear signed e-mail message that e-mail server 12 sends to the recipient.
- the first step carried out in the conversion process at the e-mail server is to determine whether the e-mail message is opaque signed or not.
- this process is carried out by viewing the MIME content type of the message. If it is of type multipart/signed, then it is clear signed. Otherwise, a check on the Cryptographic Message Syntax (CMS) encoding of the message is carried out to determine if it is signed. Then is done by looking at the value of the contentInfo Object Identifier at the start of the encoding and seeing if it indicates that the message is signed. If it is signed, then it must be opaque signed, otherwise it may be encrypted, compressed or some other encoding mechanism used. If the message is not opaque signed, then as shown in step 42 of Figure 3, the message is passed to the next part of the process otherwise carried out by e-mail server 12 in transmitting the e-mail message to the recipient.
- CMS Cryptographic Message Syntax
- step 44 of the conversion is to process the Cryptographic Message Syntax (CMS) encoding of the S/MIME message to decode the e-mail message.
- CMS Cryptographic Message Syntax
- e-mail server 12 has the appropriate information available to permit the decoding of e-mail messages from e-mail application 10 that are encoded using the S/MIME format of the preferred embodiment.
- step 46 is carried out.
- the conversion process identifies the encapContentInfo part of the S/MIME e-mail message (the part of the e-mail message object that in the S/MIME standard includes the message content and the digital signature).
- the next step in the conversion (step 48 in Figure 3) is to read the eContent part of the identified encapContentInfo. This is the message content and will form the clear message in a resulting converted clear signed e-mail message.
- the eContent part is removed from the CMS encoding of the message (with the consequential update of the appropriate length information for the message).
- the resulting CMS encoding (minus the eContent) will form the signature for the converted clear signed e-mail message.
- Step 50 of Figure 3 involves the creation of the message object that includes:
- the preferred embodiment is described with reference to e-mail that is sent via an e-mail server.
- a server may be used in systems where wireless handheld devices are used to create e-mail messages that are then transmitted to an enterprise e-mail server for forwarding through an Internet e-mail connection to recipients.
- Other implementations of the preferred embodiment may involve the transmission and conversion of e-mail through other systems that operate in a manner analogous to e-mail servers.
- e-mail generated with an opaque signed format is forwarded to a computer system that includes a conversion function that permits the e-mail to be converted to a clear signed format before being sent to the receiving e-mail application.
- the conversion of the secure e-mail messages involves the decoding or decrypting of information and that therefore the e-mail servers in question are preferably secure to prevent the e-mail conversion process from being a point of insecurity for the e-mail system.
- the e-mail server is typically implemented by way of an e-mail server application comprising program code that executes on a server computer.
- the e-mail server application may be delivered as a computer program product in a computer code storage medium such as a magnetic, optical or electronic storage device.
- Such an e-mail server application is typically installed on a server computer in executable form.
- the e-mail server in operation is an apparatus that is capable of carrying out the operations described.
- the e-mail server includes program code that executes to carry out the conversion of the e-mail.
- the e-mail server also carries out other logging and administrative functions for e-mail applications. It will be appreciated that although the e-mail server that converts e-mails as described will often be associated with the sending e-mail application, it is also possible for such a conversion e-mail server to be associated with the receiving e-mail application. In such a case the e-mail server may be an enterprise server that receives e-mail and then redirects the e-mail to the appropriate recipient device.
- the receiving e-mail application executes on a wireless handheld device and e-mails are routed through an enterprise server that sends e-mail to a desktop destination and to the wireless handheld device.
- the e-mail server associated with the receiving e-mail application may receive opaque signed e-mail messages.
- the e-mail server if the appropriate information regarding the encoding of the opaque signed e-mail message is available to it, may operate to convert the e-mail message to a clear signed format.
- the conversion function may be optionally invoked.
- an opaque signed e-mail message may be desired even where a receiving e-mail application may not be able to access the e-mail content as a result.
- an administrator for the e-mail server is able to selectively determine whether the conversion function will apply to e-mails handled by the e-mail server.
- a further extension involves the administrator applying a more sophisticated filter to the incoming e-mails to allow the e-mail server to convert opaque signed e-mails that meet a set of defined criteria (for example, sender name, recipient name, sender user group, and so forth).
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Marketing (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Computing Systems (AREA)
- Finance (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- This invention relates generally to computing systems and, more particularly, to computing systems for the creation and transmission of secure electronic mail.
- Electronic mail (e-mail) systems will, in many cases, include a feature to allow e-mail messages to be digitally signed. A digital signature is an encoded value that is included with an e-mail message to provide a recipient with information to confirm that the message is sent by a trusted sender and/or that the message is unchanged during the transmission process. Such an email system is considered a secure e-mail system. A well-known protocol for secure e-mail is the Secure Multi-Purpose Internet Mail Extension (S/MIME).
- Two different types of digital signature schemes are in common use in secure e-mail: opaque and clear. An opaque signature is one where the secure e-mail has the message content contained inside the digital signature encoding. This approach, defines a signature for the message content and then encodes both that signature and the message content. The resulting encoded data is then transmitted as the e-mail message body.
- A clear signature is one in which a digital signature is encoded and included with the e-mail message as an attachment. The message content is not altered and is sent in this unaltered state in the message body of the e-mail.
- An advantage of an opaque e-mail message is that the content of the message is not available to recipients who are not provided with the appropriate information to decode the e-mail message body. In addition, since the message content is not immediately available, there is less of a potential for an email gateway to modify the message in some way and, in doing so, invalidate the digital signature. However, a disadvantage to the use of opaque signatures for secure e-mail is that many e-mail applications (for example Outlook 2000™ from Microsoft Corporation) are unable to display opaque signed messages in the message preview pane. To obtain the preview of the message, a user of such an e-mail application is required to open the email, thus defeating the advantages associated with the use of a preview view in the e-mail application. Further, where a receiving e-mail application does not support the protocol used to encode the e-mail, the content of an opaque signed e-mail message cannot be viewed at all.
- It is therefore desirable to have a mechanism for permitting secure e-mails that are created as opaque signed to be transmitted to allow a receiving e-mail application to display such e-mails using a preview view or to allow the content of such e-mail messages to be accessible, despite a receiving e-mail application not supporting the opaque signed protocol of the sending e-mail application
- According to an aspect of the invention there is provided a method and system for the transmission of e-mails to provide for conversion of secure e-mail to permit a receiving e-mail application to use a preview view for the e-mail or to access the message content without decoding the digital signature.
- According to another aspect of the invention there is provided a computer implemented method for transmitting e-mail, the method including the following steps:
- a) sending a secure first e-mail message addressed to a recipient and including an opaque signature to an e-mail server;
- b) decoding the first e-mail message at the e-mail server to extract the content of the first e-mail message and to extract the digital signature of the first e-mail message;
- c) generating a clear signed e-mail message at the e-mail server, the clear signed message including both the extracted content of, and the extracted digital signature of, the first e-mail message; and
- d) forwarding the clear signed e-mail message to the recipient. According to another aspect of the invention there is provided the above method in which the first e-mail message conforms to the S/MIME standard.
-
- According to another aspect of the invention there is provided the above method in which the step of extracting the content of and the digital signature of the first e-mail message includes the steps of:
- a) identifying the object encapContentInfo for the opaque signed e-mail message;
- b) copying and deleting the eContent value from encapContentInfo; and
- c) defining the extracted content and the extracted digital signature as the content and the digital signature in the clear signed e-mail message. According to another aspect of the invention there is provided the above method further including the step of determining whether the first e-mail message meets a set of pre-defined criteria for conversion to clear signed format.
-
- According to another aspect of the invention there is provided an apparatus for transmitting e-mail, including an e-mail server, the e-mail server including:
- a) computer code executable to receive an opaque signed e-mail message;
- b) computer code executable to decode the opaque signed e-mail message to extract the content of the opaque signed e-mail message and to extract the digital signature of the opaque signed e-mail message;
- c) computer code for generating a clear signed e-mail message, the clear signed message including both the extracted content of, and the extracted digital signature of, the first e-mail message; and
- d) computer code for forwarding the clear signed e-mail message to the recipient.
-
- According to another aspect of the invention there is provided the above apparatus in which the first secure e-mail message conforms to the S/MIME standard.
- According to another aspect of the invention there is provided the above apparatus in which the computer code for extracting the content of and the digital signature of the opaque signed e-mail message includes the steps of:
- a) identifying the object encapContentInfo for the opaque signed e-mail message;
- b) copying and deleting the eContent value from encapContentInfo; and
- c) defining the extracted content and the extracted digital signature as the content and the digital signature in the clear signed e-mail message. According to another aspect of the invention there is provided the above apparatus further including computer code for determining whether the opaque signed e-mail message meets a set of pre-defined criteria for conversion to clear signed format.
-
- Advantages of the invention include the ability for a sending e-mail application to use opaque signatures for outbound e-mails and for a receiving e-mail application to be able to view the message content and/or generate a preview of such secure e-mails without needing to decode the associated digital signature.
- In drawings which illustrate by way of example only a preferred embodiment of the invention,
- Figure 1 is block diagram showing aspects of the transmission of e-mails in accordance with the preferred embodiment.
- Figure 2 is a block diagram illustrating the elements of opaque signed and clear signed e-mail messages (prior art).
- Figure 3 is a flow diagram illustrating the conversion of opaque signed e-mails in accordance with the preferred embodiment.
-
- The preferred embodiment is described with reference to an e-mail system in which an e-mail application forwards e-mails to an e-mail server for transmission to a recipient or receiving e-mail application. The block diagram of Figure 1 illustrates one such arrangement. Sending e-mail
application 10 usese-mail server 12 to handle outbound e-mails generated bye-mail application 10. In the example of Figure 1, receivinge-mail application 14 is a recipient of e-mails from sendinge-mail application 10. - The preferred embodiment is described with reference to sending and receiving e-mail applications. It will be understood by those skilled in the art that an e-mail application includes program code that is executable to provide a user with the ability to manipulate e-mail messages. Typically, an e-mail application will provide the user with functions for creating, sending, receiving, viewing, and storing e-mail messages. Subsets of these functions may also be provided in different e-mail applications intended to be used with particular devices. The program code of an e-mail application may be executable on a personal computer, a wireless handheld device, or other devices that are intended to permit e-mails to be created or read.
- The example of Figure 1 shows
opaque e-mail 16 being forwarded from sendinge-mail application 10 toe-mail server 12. As will be understood by those skilled in the art,e-mail application 10 may be one of many commercially available or custom-developed e-mail systems. E-mailapplication 10 does, however, have the capability of generating secure e-mail using an opaque signature. In the example of Figure 1,opaque e-mail 16 is such an e-mail generated bye-mail application 10. - Figure 2 is a block diagram that illustrates the high level elements of an e-mail message having an opaque signature and provides a similar illustration for an e-mail having a clear signature. In Figure 2, a generalized example of an opaque signed e-mail is illustrated with
e-mail message body 20 shown as containingsignature 22 which, in turn, containscontent 24 within its encoding. As referred to above,signature 22 is encoded. Also in Figure 2, a generalized example of a clear signed e-mail is illustrated withe-mail message body 30 ande-mail attachment 31.E-mail message body 30 includescontent 34 which is not encoded within the signature. In the case of this clear signed e-mail,signature 32 is encoded and is placed ine-mail attachment 31. - As will be appreciated by the elements of the e-mail formats shown in Figure 2, when
opaque e-mail 16 is sent from sendinge-mail application 10, the content is found only in an encoded portion of the e-mail message body (shown ase-mail body 20 in Figure 2). When received by a recipient having an e-mail application, the message body of an opaque signed secure e-mail is processed andsignature 22 is decoded to allowcontent 24 to be extracted and displayed. If the receiving e-mail application is unable to decodesignature 22 then the e-mail cannot be displayed to the user with that application. Thus, for example, if an S/MIME format is used for creating the e-mail and the receiving e-mail application does not support S/MIME, the content of the e-mail cannot be accessed. - Further, in typical e-mail applications, there is a preview pane that is optionally displayed when lists of e-mail messages are displayed for a user. In such applications, it is typical for the preview pane to merely present the e-mail message content (or a portion of the content) without decoding such content. Thus, when an e-mail is sent in an opaque signed format, the message is not viewable in the preview pane of such a receiving e-mail application.
- According to the preferred embodiment, e-mail is transmitted through an e-mail server. The e-mail server includes program code for converting opaque signed e-mail to a clear signed format. This can be seen in the example of Figure 1. Sending
e-mail application 10 generatesexample e-mail 16, in opaque signed S/MIME format. In the preferred embodiment this e-mail is forwarded toe-mail server 12, prior to the e-mail being sent to receivinge-mail application 14. According to the preferred embodiment, the functionality ofe-mail server 12 includes a conversion function to convert opaque signed messages to clear signed messages. As will be appreciated,e-mail server 12 is able to decrypt the opaque signed messages sent by sendinge-mail application 10. In the preferred embodiment the encoding ofe-mail 16 is an S/MIME encoding and the steps carried out to converte-mail message 16 into a clear signed format (e-mail 18) are set out in the flow diagram of Figure 3. In general, the step of conversion includes extraction of the message content and of the digital signature from the opaque signed e-mail, the extracted message content and the extracted digital signature then being included in a clear signed e-mail message thate-mail server 12 sends to the recipient. - As shown in
decision box 40 in Figure 3, the first step carried out in the conversion process at the e-mail server is to determine whether the e-mail message is opaque signed or not. In the case of an S/MIME message, this process is carried out by viewing the MIME content type of the message. If it is of type multipart/signed, then it is clear signed. Otherwise, a check on the Cryptographic Message Syntax (CMS) encoding of the message is carried out to determine if it is signed. Then is done by looking at the value of the contentInfo Object Identifier at the start of the encoding and seeing if it indicates that the message is signed. If it is signed, then it must be opaque signed, otherwise it may be encrypted, compressed or some other encoding mechanism used. If the message is not opaque signed, then as shown instep 42 of Figure 3, the message is passed to the next part of the process otherwise carried out bye-mail server 12 in transmitting the e-mail message to the recipient. - Alternatively, if the e-mail server determines that the e-mail message is opaque signed, step 44 of the conversion is to process the Cryptographic Message Syntax (CMS) encoding of the S/MIME message to decode the e-mail message. As indicated above,
e-mail server 12 has the appropriate information available to permit the decoding of e-mail messages frome-mail application 10 that are encoded using the S/MIME format of the preferred embodiment. - Once the e-mail message has been decoded,
step 46 is carried out. The conversion process identifies the encapContentInfo part of the S/MIME e-mail message (the part of the e-mail message object that in the S/MIME standard includes the message content and the digital signature). The next step in the conversion (step 48 in Figure 3) is to read the eContent part of the identified encapContentInfo. This is the message content and will form the clear message in a resulting converted clear signed e-mail message. As part ofstep 48, the eContent part is removed from the CMS encoding of the message (with the consequential update of the appropriate length information for the message). The resulting CMS encoding (minus the eContent) will form the signature for the converted clear signed e-mail message. - The last step in the conversion is to create a MIME message of type multipart/signed (the new clear signed e-mail message). The information to be used to define the new message has been defined as described with reference to the above steps.
Step 50 of Figure 3 involves the creation of the message object that includes: - a. the contents of the eContent part of the opaque signed e-mail message
becomes the message part of the clear signed e-mail message (see
content 34 in the Figure 2); and - b. the CMS encoding of the signature (with the eContent removed) as the
other parts of the multipart/signed message (including
signature 32 as shown in Figure 2).
The result of the above conversion process is -
- The preferred embodiment is described with reference to e-mail that is sent via an e-mail server. Such a server may be used in systems where wireless handheld devices are used to create e-mail messages that are then transmitted to an enterprise e-mail server for forwarding through an Internet e-mail connection to recipients. Other implementations of the preferred embodiment may involve the transmission and conversion of e-mail through other systems that operate in a manner analogous to e-mail servers. In general, e-mail generated with an opaque signed format is forwarded to a computer system that includes a conversion function that permits the e-mail to be converted to a clear signed format before being sent to the receiving e-mail application. It will be appreciated that the conversion of the secure e-mail messages involves the decoding or decrypting of information and that therefore the e-mail servers in question are preferably secure to prevent the e-mail conversion process from being a point of insecurity for the e-mail system.
- The e-mail server is typically implemented by way of an e-mail server application comprising program code that executes on a server computer. The e-mail server application may be delivered as a computer program product in a computer code storage medium such as a magnetic, optical or electronic storage device. Such an e-mail server application is typically installed on a server computer in executable form. The e-mail server in operation is an apparatus that is capable of carrying out the operations described.
- In the preferred embodiment, the e-mail server includes program code that executes to carry out the conversion of the e-mail. The e-mail server also carries out other logging and administrative functions for e-mail applications. It will be appreciated that although the e-mail server that converts e-mails as described will often be associated with the sending e-mail application, it is also possible for such a conversion e-mail server to be associated with the receiving e-mail application. In such a case the e-mail server may be an enterprise server that receives e-mail and then redirects the e-mail to the appropriate recipient device. Such an arrangement is possible where the receiving e-mail application executes on a wireless handheld device and e-mails are routed through an enterprise server that sends e-mail to a desktop destination and to the wireless handheld device. In such an arrangement, the e-mail server associated with the receiving e-mail application may receive opaque signed e-mail messages. The e-mail server, if the appropriate information regarding the encoding of the opaque signed e-mail message is available to it, may operate to convert the e-mail message to a clear signed format.
- In the preferred embodiment, the conversion function may be optionally invoked. In some contexts an opaque signed e-mail message may be desired even where a receiving e-mail application may not be able to access the e-mail content as a result. For this reason, an administrator for the e-mail server is able to selectively determine whether the conversion function will apply to e-mails handled by the e-mail server. A further extension involves the administrator applying a more sophisticated filter to the incoming e-mails to allow the e-mail server to convert opaque signed e-mails that meet a set of defined criteria (for example, sender name, recipient name, sender user group, and so forth).
- Various embodiments of the present invention having been thus described in detail by way of example, it will be apparent to those skilled in the art that variations and modifications may be made without departing from the invention. The invention includes all such variations and modifications as fall within the scope of the appended claims.
Claims (8)
- A computer implemented method for transmitting e-mail, the method comprising the following steps:a. sending a secure first e-mail message addressed to a recipient and comprising an opaque signature to an e-mail server;b. decoding the first e-mail message at the e-mail server to extract the content of the first e-mail message and to extract the digital signature of the first e-mail message;c. generating a clear signed e-mail message at the e-mail server, the clear signed message comprising both the extracted content of, and the extracted digital signature of, the first e-mail message; andd. forwarding the clear signed e-mail message to the recipient.
- The method of claim 1 in which the first e-mail message conforms to the S/MIME standard.
- The method of claim 2 in which the step of extracting the content of and the digital signature of the first e-mail message comprises the steps of:a. identifying the object encapContentInfo for the opaque signed e-mail message;b. copying and deleting the eContent value from encapContentInfo; andc. defining the extracted content and the extracted digital signature as the content and the digital signature in the clear signed e-mail message.
- The method of any one of claims 1 to 3 further comprising the step of determining whether the first e-mail message meets a set of pre-defined criteria for conversion to clear signed format.
- An apparatus for transmitting e-mail, comprising an e-mail server, the e-mail server comprising:a. computer code executable to receive an opaque signed e-mail message;b. computer code executable to decode the opaque signed e-mail message to extract the content of the opaque signed e-mail message and to extract the digital signature of the opaque signed e-mail message;c. computer code for generating a clear signed e-mail message, the clear signed message comprising both the extracted content of, and the extracted digital signature of, the first e-mail message; andd. computer code for forwarding the clear signed e-mail message to the recipient.
- The apparatus of claim 5 in which the first secure e-mail message conforms to the S/MIME standard.
- The apparatus of claim 6 in which the computer code for extracting the content of and the digital signature of the opaque signed e-mail message comprises the steps of:a. identifying the object encapContentInfo for the opaque signed e-mail message;b. copying and deleting the eContent value from encapContentInfo; andc. defining the extracted content and the extracted digital signature as the content and the digital signature in the clear signed e-mail message.
- The apparatus of any one of claims 5 to 7 further comprising computer code for determining whether the opaque signed e-mail message meets a set of pre-defined criteria for conversion to clear signed format.
Priority Applications (15)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04101878A EP1592188B1 (en) | 2004-04-30 | 2004-04-30 | Method and apparatus for transmission of digitally signed electronic mail |
AT04101878T ATE335336T1 (en) | 2004-04-30 | 2004-04-30 | METHOD AND DEVICE FOR TRANSMITTING DIGITALLY SIGNED E-MAIL |
ES04101878T ES2270277T3 (en) | 2004-04-30 | 2004-04-30 | METHOD AND APPARATUS FOR DIGITAL SIGNED EMAIL TRANSMISSION. |
DE602004001757T DE602004001757T2 (en) | 2004-04-30 | 2004-04-30 | Method and device for transmitting digitally signed e-mail |
SG200502552A SG116644A1 (en) | 2004-04-30 | 2005-04-13 | Transmission of secure electronic mail formats. |
AU2005201621A AU2005201621B2 (en) | 2004-04-30 | 2005-04-18 | Transmission of secure electronic mail formats |
CA2505273A CA2505273C (en) | 2004-04-30 | 2005-04-20 | Transmission of secure electronic mail formats |
TW094113539A TWI312630B (en) | 2004-04-30 | 2005-04-27 | Computer implemented method, apparatus and computer readable medium for transmitting e-mail |
MXPA05004574A MXPA05004574A (en) | 2004-04-30 | 2005-04-28 | Transmission of secure electronic mail formats. |
JP2005133492A JP4250148B2 (en) | 2004-04-30 | 2005-04-28 | Secure email format transmission |
CNB2005100668930A CN100473056C (en) | 2004-04-30 | 2005-04-30 | Transmission of secure electronic mail formats |
KR1020050036485A KR100868712B1 (en) | 2004-04-30 | 2005-04-30 | Transmission of secure electronic mail formats |
BRPI0501454-9A BRPI0501454B1 (en) | 2004-04-30 | 2005-05-02 | TRANSMISSION OF SAFE ELECTRONIC CORRESPONDENCE FORMATS |
HK06105178A HK1084803A1 (en) | 2004-04-30 | 2006-05-02 | Method and apparatus for transmission of digitallysigned electronic mail |
KR1020070097605A KR20070102974A (en) | 2004-04-30 | 2007-09-27 | Transmission of secure electronic mail formats |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04101878A EP1592188B1 (en) | 2004-04-30 | 2004-04-30 | Method and apparatus for transmission of digitally signed electronic mail |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1592188A1 true EP1592188A1 (en) | 2005-11-02 |
EP1592188B1 EP1592188B1 (en) | 2006-08-02 |
Family
ID=34929048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04101878A Expired - Lifetime EP1592188B1 (en) | 2004-04-30 | 2004-04-30 | Method and apparatus for transmission of digitally signed electronic mail |
Country Status (14)
Country | Link |
---|---|
EP (1) | EP1592188B1 (en) |
JP (1) | JP4250148B2 (en) |
KR (2) | KR100868712B1 (en) |
CN (1) | CN100473056C (en) |
AT (1) | ATE335336T1 (en) |
AU (1) | AU2005201621B2 (en) |
BR (1) | BRPI0501454B1 (en) |
CA (1) | CA2505273C (en) |
DE (1) | DE602004001757T2 (en) |
ES (1) | ES2270277T3 (en) |
HK (1) | HK1084803A1 (en) |
MX (1) | MXPA05004574A (en) |
SG (1) | SG116644A1 (en) |
TW (1) | TWI312630B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7568106B2 (en) * | 2005-12-16 | 2009-07-28 | International Business Machines Corporation | Cooperative non-repudiated message exchange in a network environment |
CN102098293B (en) * | 2010-12-28 | 2013-07-10 | 北京深思洛克软件技术股份有限公司 | Method for previewing encrypted email |
CN102752232B (en) * | 2011-04-22 | 2018-02-09 | 中兴通讯股份有限公司 | The processing method and gateway device of media information |
CN107508749B (en) * | 2017-09-18 | 2019-11-19 | 维沃移动通信有限公司 | A kind of message method and mobile terminal |
CN111970307B (en) * | 2020-06-30 | 2022-07-22 | 冠群信息技术(南京)有限公司 | Transparent data transmission system, sending terminal, server, receiving terminal and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000031944A1 (en) * | 1998-11-25 | 2000-06-02 | Orad Software Limited | A secure electronic mail gateway |
WO2003001326A2 (en) * | 2001-06-22 | 2003-01-03 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20020067372A (en) * | 2001-02-16 | 2002-08-22 | 이니텍(주) | Method for sending and receiving Secure Webmail supporting S/MIME Standard |
-
2004
- 2004-04-30 AT AT04101878T patent/ATE335336T1/en not_active IP Right Cessation
- 2004-04-30 DE DE602004001757T patent/DE602004001757T2/en not_active Expired - Lifetime
- 2004-04-30 EP EP04101878A patent/EP1592188B1/en not_active Expired - Lifetime
- 2004-04-30 ES ES04101878T patent/ES2270277T3/en not_active Expired - Lifetime
-
2005
- 2005-04-13 SG SG200502552A patent/SG116644A1/en unknown
- 2005-04-18 AU AU2005201621A patent/AU2005201621B2/en active Active
- 2005-04-20 CA CA2505273A patent/CA2505273C/en active Active
- 2005-04-27 TW TW094113539A patent/TWI312630B/en active
- 2005-04-28 MX MXPA05004574A patent/MXPA05004574A/en active IP Right Grant
- 2005-04-28 JP JP2005133492A patent/JP4250148B2/en active Active
- 2005-04-30 KR KR1020050036485A patent/KR100868712B1/en active IP Right Grant
- 2005-04-30 CN CNB2005100668930A patent/CN100473056C/en active Active
- 2005-05-02 BR BRPI0501454-9A patent/BRPI0501454B1/en active IP Right Grant
-
2006
- 2006-05-02 HK HK06105178A patent/HK1084803A1/en not_active IP Right Cessation
-
2007
- 2007-09-27 KR KR1020070097605A patent/KR20070102974A/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000031944A1 (en) * | 1998-11-25 | 2000-06-02 | Orad Software Limited | A secure electronic mail gateway |
WO2003001326A2 (en) * | 2001-06-22 | 2003-01-03 | Tumbleweed Communications Corp. | Method and system for e-mail message transmission |
Non-Patent Citations (1)
Title |
---|
RAMSDELL B: "RFC 2633: S/MIME Version 3 Message Specification", INTERNET ENGINEERING TASK FORCE, NETWORK WORKING GROUP, June 1999 (1999-06-01), XP002262227 * |
Also Published As
Publication number | Publication date |
---|---|
KR20060047676A (en) | 2006-05-18 |
SG116644A1 (en) | 2005-11-28 |
MXPA05004574A (en) | 2005-11-23 |
KR100868712B1 (en) | 2008-11-13 |
BRPI0501454B1 (en) | 2018-08-14 |
BRPI0501454A (en) | 2006-01-10 |
EP1592188B1 (en) | 2006-08-02 |
CN1694436A (en) | 2005-11-09 |
DE602004001757T2 (en) | 2006-11-30 |
CA2505273A1 (en) | 2005-10-30 |
CN100473056C (en) | 2009-03-25 |
JP4250148B2 (en) | 2009-04-08 |
JP2005317029A (en) | 2005-11-10 |
DE602004001757D1 (en) | 2006-09-14 |
AU2005201621A1 (en) | 2005-11-17 |
TW200603587A (en) | 2006-01-16 |
HK1084803A1 (en) | 2006-08-04 |
KR20070102974A (en) | 2007-10-22 |
AU2005201621B2 (en) | 2006-12-21 |
ES2270277T3 (en) | 2007-04-01 |
CA2505273C (en) | 2010-08-31 |
TWI312630B (en) | 2009-07-21 |
ATE335336T1 (en) | 2006-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2141872B1 (en) | System and method for transmitting and utilizing attachments | |
US7020779B1 (en) | Secure, distributed e-mail system | |
US20060184628A1 (en) | Method and system to compose and transmit different contents to different receipients in a single message | |
CN1717697A (en) | System and method for compressing secure e-mail for exchange with a mobile data communication device | |
JP2002024147A (en) | System and method for secure mail proxy and recording medium | |
US8677113B2 (en) | Transmission of secure electronic mail formats | |
CA2505273C (en) | Transmission of secure electronic mail formats | |
US20100287372A1 (en) | Mail server and method for sending e-mails to their recipients | |
GB2391770A (en) | Sending email securely | |
WO2014203296A1 (en) | Information processing device, e-mail viewing restriction method, computer program, and information processing system | |
US20120079275A1 (en) | Content filtering of secure e-mail | |
US7120796B2 (en) | Method and system for preventing computer worm dissemination using encryption | |
US20050267939A1 (en) | Transparent security for electronic mail messages | |
JP2008299561A (en) | Device for transmitting electronic mail | |
JP2007306182A (en) | E-mail making device, program and method, and e-mail transmitter | |
US20080172470A1 (en) | Method and a system for the secure exchange of an e-mail message | |
RU2223540C2 (en) | Method and system for sending and receiving protected electronic messages | |
EP1791316B1 (en) | E-mail with secure message parts | |
JP2009064334A (en) | Electronic mail delivery system, method and program | |
JP2015222576A (en) | Information processing device, e-mail browsing restriction method, computer program and information processing system | |
JP2023156423A (en) | Risk checking system, risk level checking method, and program | |
Toyoda et al. | RFC 3965: A Simple Mode of Facsimile Using Internet Mail | |
KR20000064120A (en) | E-Mail Signing-File UMS Electonic Approval System | |
Rudich | Sealing the E-mail envelope | |
Wing | Network Working Group K. Toyoda Request for Comments: 3965 H. Ohno Obsoletes: 2305 J. Murai Category: Standards Track WIDE Project |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20040527 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL HR LT LV MK |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AXX | Extension fees paid |
Extension state: LV Payment date: 20040527 Extension state: AL Payment date: 20040527 Extension state: HR Payment date: 20040527 Extension state: LT Payment date: 20040527 Extension state: MK Payment date: 20040527 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL HR LT LV MK |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED. Effective date: 20060802 Ref country code: LI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: CH Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1084803 Country of ref document: HK |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 602004001757 Country of ref document: DE Date of ref document: 20060914 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1084803 Country of ref document: HK |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061102 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061102 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061102 |
|
NLV1 | Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act | ||
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070102 |
|
LTIE | Lt: invalidation of european patent or patent extension |
Effective date: 20060802 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
ET | Fr: translation filed | ||
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2270277 Country of ref document: ES Kind code of ref document: T3 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20070503 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20061103 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 |
|
PGRI | Patent reinstated in contracting state [announced from national office to epo] |
Ref country code: IT Effective date: 20080601 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070430 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060802 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070203 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 602004001757 Country of ref document: DE Representative=s name: MERH-IP MATIAS ERNY REICHL HOFFMANN, DE |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: PC2A Owner name: BLACKBERRY LIMITED Effective date: 20141016 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 602004001757 Country of ref document: DE Owner name: BLACKBERRY LIMITED, WATERLOO, CA Free format text: FORMER OWNER: RESEARCH IN MOTION LTD., WATERLOO, ONTARIO, CA Effective date: 20140925 Ref country code: DE Ref legal event code: R082 Ref document number: 602004001757 Country of ref document: DE Representative=s name: MERH-IP MATIAS ERNY REICHL HOFFMANN, DE Effective date: 20140925 Ref country code: DE Ref legal event code: R082 Ref document number: 602004001757 Country of ref document: DE Representative=s name: MERH-IP MATIAS ERNY REICHL HOFFMANN PATENTANWA, DE Effective date: 20140925 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 13 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 14 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 15 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602004001757 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0012580000 Ipc: H04L0051000000 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20230419 Year of fee payment: 20 Ref country code: FR Payment date: 20230425 Year of fee payment: 20 Ref country code: ES Payment date: 20230503 Year of fee payment: 20 Ref country code: DE Payment date: 20230427 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20230427 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 602004001757 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 602004001757 Country of ref document: DE Ref country code: DE Ref legal event code: R081 Ref document number: 602004001757 Country of ref document: DE Owner name: MALIKIE INNOVATIONS LTD., IE Free format text: FORMER OWNER: BLACKBERRY LIMITED, WATERLOO, ONTARIO, CA |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: PE20 Expiry date: 20240429 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20240524 |